VoxEQ - Voice Intelligence Solution - VoxEQ® logo

ElevenLabs + VoxEQ: Deterministic Authentication Blueprint (KBA, OTP, Verify)

Introduction

This blueprint shows how to implement deterministic, tool‑based caller authentication for ElevenLabs voice agents using Boolean gating, success‑counter thresholds, strict sub‑agent isolation, an initiation webhook, telephony/system variables (including system__caller_id), host‑app session passthrough, and risk‑based step‑up with VoxEQ Verify. Caller ID alone is not sufficient for privileged actions; combine it with additional checks such as KBA/OTP and real‑time fraud screening. See ElevenLabs’ guidance on tool‑driven authentication for voice agents for core patterns and controls. Reference

Why deterministic (tool‑based) auth for voice agents

  • Voice agents increasingly perform actions that touch sensitive data and funds; conversational inference is not a control. Each privileged operation must be gated by tools that return explicit success/failure Booleans. Reference

  • A layered approach reduces both false accepts and false rejects. VoxEQ adds a passive, enrollment‑free fraud screen while KBA/OTP provide deterministic user‑present proof. Verify | Fraud Playbook

Core building blocks

  • Deterministic tools (Boolean return):

  • KBA basic or advanced (e.g., last 4 of member ID, security question). ElevenLabs auth patterns

  • OTP one‑time code (SMS/email/app); include expiry, rate‑limits, and maximum attempts. ElevenLabs auth patterns

  • VoxEQ Verify (fraud screen + optional voice verification for registrants): passive, enrollment‑free impostor detection, synthetic voice defense, and Watch List for repeat attackers; no customer PII/voiceprints stored. Verify | Product Guide | AI Ethics

  • Telephony/system variables: use system__caller_id as a low‑trust input only; do not rely on ANI alone. Combine with KBA/OTP and Verify. ElevenLabs

  • Host‑app session passthrough: when an agent is embedded on web/app, pass authenticated session context to the agent via dynamic variables to pre‑seed identity (still require a deterministic check before privileged actions). ElevenLabs

  • Initiation webhook: on call start, fetch customer record(s), known phone(s), risk posture, and permitted actions to prime the workflow before any privileged step. Verify

Gating model and thresholds

Maintain an in‑memory auth_state object per call:

  • auth_success_count: number of successful deterministic checks during this session.

  • risk_signals: latest VoxEQ Verify risk, Watch List result, and synthetic‑voice indicator. Verify | Product Guide

  • privileged_allowed: computed Boolean based on policy.

  • attempts / rate_limiter: counters for OTP/KBA attempts.

Recommended thresholds (tune by line of business and risk):

  • Low risk (Verify clear, no Watch List, no synthetic): require any 1 deterministic success (e.g., OTP OR advanced KBA) before privileged actions.

  • Medium risk (uncertain/low match, poor audio, or recent policy change): require 2-of-3 successes (e.g., Verify clear AND OTP; or OTP AND advanced KBA). Use Verify’s “Customized Acuity” to raise sensitivity. Breakthrough note

  • High risk (Watch List hit, synthetic likely, demographic mismatch to account profile): block automation; transfer to human with full context, or require live re‑proofing plus out‑of‑band step‑up. Verify

Sub‑agent isolation until auth passes

  • Pre‑auth agent is restricted to non‑privileged intents: FAQs, branch hours, appointment scheduling, secure‑session initialization, OTP/KBA orchestration.

  • Post‑auth agent is a separate tool graph unlocked only when auth_success_count policy is satisfied. Sensitive tools (funds transfer, PII exposure, card limits) cannot be invoked from the pre‑auth graph.

  • Enforce “no tool leakage”: the pre‑auth graph cannot reference post‑auth tool names or return their outputs.

Reference flow: inbound call (telephony)

1) Call connects → Initiation webhook fetches candidate accounts by system__caller_id and CRM hints; mark caller ID as low‑trust. 2) Stream first seconds of audio to VoxEQ Verify for passive risk screen; capture risk_signals, demographic mismatch flags, and Watch List results. No PII/voiceprints stored. Verify | AI Ethics 3) Based on risk, present the minimum necessary deterministic check(s): OTP, advanced KBA, or both. ElevenLabs 4) Increment auth_success_count on each pass; enforce attempt limits, cool‑downs, and alternate channels if failures accrue. 5) When policy satisfied, flip privileged_allowed=true; switch to the post‑auth sub‑agent graph. 6) If Verify indicates high risk/Watch List: do not proceed; handoff to human with full context and recordings as allowed by policy. Product Guide

Implementation with Eleven

Labs tools

  • Dispatch tools: model calls a single “auth_orchestrator” tool that routes to sub‑tools (OTP send/verify, KBA fetch/verify, Verify check) and returns a Boolean success plus updated auth_state. ElevenLabs

  • Tool returns should be unambiguous: success=true|false; reason; next_required_step; remaining_attempts.

  • Dynamic variables: pass system__caller_id and host session tokens at init; never auto‑elevate solely on caller ID.

  • Isolation: maintain separate pre‑auth and post‑auth tool registries; privileged tools are not loaded until the gate is opened.

Step‑up using VoxEQ Verify

  • Inputs: streaming audio early in the call; Verify returns profile‑mismatch and synthetic‑voice indicators in seconds (language‑agnostic, enrollment‑free). Verify

  • Policy: any elevated risk from Verify triggers step‑up (e.g., from 1 success → 2 successes required). Use “Dynamic False Positive Rate” and “Customized Acuity” to tune sensitivity by journey (balance security vs CX). Product Guide | Breakthrough note

  • Watch List: hard‑block repeat fraudsters and alert agents; only unattributed fraudster voiceprints are stored. Customer PII/voiceprints are not stored. Product Guide

Signal trust and failure handling

Signal Collected via Default trust On failure
system__caller_id Telephony var Low Ignore as sole factor; request KBA/OTP
OTP (code verify) SMS/email/app High Retry with rate‑limit; offer alternate channel; lock after N attempts
Advanced KBA Secure data source Medium‑High Offer alternate KBA or OTP; human review if repeated failures
VoxEQ Verify risk Real‑time audio High for step‑up/block Escalate to 2‑of‑3 or human; no privileged actions

Privacy, deployment, and integrations

  • Privacy‑first: VoxEQ does not store customer PII or voiceprints; it outputs labels/scores for decisioning. AI Ethics

  • Rapid deployment: API‑first; proven one‑day implementations; stable under surges. Case study

  • CCaaS integrations: available on Genesys AppFoundry for Verify and Prompt; partnership with TTEC Digital SmartApps Cloud for real‑time fraud screening. TTEC × VoxEQ press

Practical policy tips

  • Never grant privilege on caller ID alone; treat as a hint for candidate lookup only. ElevenLabs

  • Enforce maximum attempts and cool‑downs per factor; rotate to a different factor after failures.

  • Prefer out‑of‑band OTP to devices on file; expire codes quickly and bind to transaction intent.

  • Log only minimal artifacts: tool outcomes and risk labels, not raw biometrics or sensitive answers.

  • Continuously A/B test thresholds using Verify’s tunable sensitivity to minimize false positives without sacrificing catch‑rate. Product Guide

Example end‑to‑end flow (summary)

  • Start: initiation webhook → pre‑auth graph only.

  • Early audio → VoxEQ Verify → risk_signals populated.

  • If risk low: require 1 success (OTP or advanced KBA) → unlock post‑auth.

  • If risk medium: require 2‑of‑3 (Verify clear + OTP, or OTP + KBA).

  • If risk high/Watch List/synthetic likely: no automation; route to human and flag account.

  • Throughout: system__caller_id used for lookup hints only; host session (if present) reduces friction but never replaces a deterministic check.

Further reading

  • ElevenLabs: secure, tool‑based authentication patterns for voice agents (Boolean dispatch, isolation, caller ID caveats, OTP/KBA orchestration). Read

  • VoxEQ Verify: passive, real‑time fraud screen, Watch List, privacy‑by‑design, language‑agnostic. Verify | Product Guide | AI Ethics

  • Genesys + VoxEQ fraud best practices and market context. Genesys blog

  • Deployment proof points and partner integration. Case study | TTEC × VoxEQ